Analysis

  • max time kernel
    38s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2022, 06:50

General

  • Target

    bfd5c1c46f223bf4e6451bcccf07ec45a3f943bc218e265f21356eb38625942b.exe

  • Size

    118KB

  • MD5

    69a1286120443a0840c5fa321761d1e0

  • SHA1

    4cc995b2dbeb5f1b6fb8671ebc9d5a7aaabcfaa5

  • SHA256

    bfd5c1c46f223bf4e6451bcccf07ec45a3f943bc218e265f21356eb38625942b

  • SHA512

    9bd78ee70afa3ca40cf534606033cccd91c99780eccf32e570e2564eee709c31402b0634b553c65cbff02394f4e6a189ad2d70ed7e2e0197e0f1746e42d1a0ad

  • SSDEEP

    1536:/uuAW/+oAR7e3jfGeIp7lKIO2VNjeD74b0Zx8Q6/OfENjeD74b0Zx8Q6p4O:O4AETGp7lKYs4YxXWs4YxXq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfd5c1c46f223bf4e6451bcccf07ec45a3f943bc218e265f21356eb38625942b.exe
    "C:\Users\Admin\AppData\Local\Temp\bfd5c1c46f223bf4e6451bcccf07ec45a3f943bc218e265f21356eb38625942b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\6910.tmp\C.bat" "
      2⤵
        PID:2012

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\6910.tmp\C.bat

            Filesize

            816B

            MD5

            f12fa1c5d7f615815a8e0a835764648f

            SHA1

            e1b20e84cdc2ef56aef34bfa704e6c3042f8a439

            SHA256

            311efde2f16650a5bf43c98df331a798353f0bcaa9c8ec01833b6cdbe90d0829

            SHA512

            0f2ccc69bc05c9d6984774577b1a8d20ea1cab3b36afa5db1a16931a7d095c059d0e16af9e45ef3138afb1a96cf53955db1e46482907d6062493b5b3f385709b

          • memory/784-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

            Filesize

            8KB

          • memory/784-55-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB

          • memory/784-58-0x0000000000400000-0x0000000000411000-memory.dmp

            Filesize

            68KB